LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS
|
|
- Ruby Potter
- 8 years ago
- Views:
Transcription
1 1 LEARNING COMPUTER SYSTEMS VULNERABILITIES EXPLOITATION THROUGH PENETRATION TEST EXPERIMENTS Te-Shun Chou and Tijjani Mohammed Department of Technology Systems East Carolina University Abstract This paper describes a project that focused on the study of the exploitation of information systems vulnerabilities in an intrusion detection and incidents response graduate course. The project incorporated a series of penetration testing labs and provided detailed instructions for students to conduct essential hands-on activities in a step-by-step fashion. The labs included footprinting, ARP poisoning, man-in-the-middle attack, IP spoofing, exploitation, and collecting victims' data. In this paper, these labs will be described, along with the evaluation results of the project. Keywords: Intrusion detection and incidents response, virtualization, network security, penetration testing 1. Introduction The major goals of teaching information security courses include delivering the theoretical knowledge across different fields and preparing students with practical skills so that they can apply what they have learnt in the real world. To tackle the second goal in an intrusion detection and incidents response graduate course, a project that comprised of hands-on activities relating to performance evaluation of intrusion detection system (IDS) was designed in and implemented [1,2]. The project was divided into six phases: creation of an intrusion detection experimental environment, attacks recording, analysis of attack signatures, generation of intrusion detection rules, collection of normal traffic, and IDS performance evaluation. Each of these phases acted as a learning development for students and raised their level of knowledge to a certain task. By successfully completing six phases, students advanced their skills and understandings in the design of IDS. In order to broaden students learning, we designed another project that focused on the study of hackers behavior and information systems vulnerabilities. The project incorporated a series of penetration testing labs and provided detailed instructions for students to conduct essential hands-on activities in a step-by-step fashion. The labs included footprinting, ARP poisoning, man-in-the-middle attack, IP spoofing, exploitation, and collecting victims' data. Network
2 2 security tools were used to exploit information systems vulnerabilities and all of the lab activities were performed in a virtual environment. The objective of this project was to help students perform security assessments and understand computer systems vulnerabilities in an experimental environment. This paper is organized as follows. Section 2 presents the labs used in the project. Section 3 discusses the result of the project evaluation. Finally, the conclusions and future work is presented in the last section. 2. Penetration Testing Labs 2.1. Lab Environment Setup The project started with the creation of a virtual network using VMware as the virtualization platform. This virtual environment allowed students to install and configure multiple virtual machines that ran different operating systems in one physical machine. For performing the experiments, the virtual network included one attack host and two victim hosts. The attack host was used to launch exploration against the victim hosts. In this project BackTrack was used as the attack host and two victim hosts, Linux CentOS and Windows XP, were set up within the VMware workstation. BackTrack is a Linux-based digital forensics and penetration testing distribution for professionals to perform security assessments in an experimental environment. It organizes security tools into 12 categories: information gathering, vulnerability assessment, exploitation tools, privilege escalation, maintaining access, reverse engineering, RFID tools, stress testing, forensics, reporting tools, services, and miscellaneous [6]. In this project, we used BackTrack tools to conduct penetration testing experiments Labs Penetration test involves network security assessments and the exploitation of computer systems vulnerabilities. It attempts to exploit the vulnerabilities on computer systems and networks using simulated attacks. In this project we developed a series of labs for students to gain hands-on experiences in both network penetration testing and application security testing. A total of six labs were developed, including footprinting, ARP poisoning, man-in-the-middle attack, IP spoofing, exploitation, and collecting victims' data. Students were asked to perform the lab activities individually. Upon completion of the project, the students were required to write a short essay on each lab describing what they had learned from the project Footprinting lab In general, Footprinting is the first step used for the security penetration test of a network. The purpose of footprinting is to collect as much information of a network as possible for the use in future hacking. It includes information gathering, determining the network range, identifying active machines, finding open ports and access points, OS fingerprinting, fingerprinting services,
3 3 and mapping the network. In this lab we used a variety of tools to gather information on network infrastructures such as domain names, IP addresses, and routing information. The tools utilized include Whois, Dnsmap, Nslookup, Traceroute, Dnsenum, Dmity, Scapy, and Dnmap Address Resolution Protocol (ARP) poisoning lab Address Resolution Protocol (ARP) is a network layer protocol used for mapping an Internet Protocol (IP) address to its corresponding Media Access Control (MAC) address. When a device needs to send packets to a target host over Ethernet, it must have both IP and MAC addresses information of the target. The IP-to-MAC address mapping data is stored in an ARP table of each device. If the target s address mapping information is not found in a device's ARP table, the device will send an ARP request broadcast message to all computers on the subnet. The computer with the given IP address sends an ARP reply in response to the broadcast that allows the sender to be able to deliver data to the target computer. Also, the sender will update its ARP cache for future use. An ARP table includes network devices IP addresses and their corresponding MAC addresses. ARP poisoning, also called an ARP spoofing attack, is a type of attack that compromises the ARP table and changes the MAC address so that the IP address points to another device or the attacker itself. Attackers could then steal data from the compromised computers and eavesdrop using man-in-the middle technique. In addition, legitimate devices could be prevented from accessing the Internet or other external networks because of ARP poisoning attack. In this lab, the tool Ettercap was first used to resolve two victims IP addresses to MAC addresses, then again used to compromise the victims MAC addresses to the attacker s MAC address Man-in-the-middle attack lab By intercepting legitimate communication between two computers, man-in-the-middle attacks can proceed the attacked machine in either passive or active ways. In a passive attack, the attacker intercepts the data, records it and then sends it to the destination without alternation. In an active attack, the attacker captures the data, changes its content and forges a response to the recipient the sender was originally intending to visit. In this lab, the tool Ettercap was used to perform a man-in-the-middle attack to monitor activities in the victim host XP. When a website was opened in the victim s web browser, all of the messages in the victim machine were intercepted by the attacker IP spoofing lab IP spoofing attack impersonates a trusted host to send messages to other computer(s) with an IP address of that trusted host for gaining unauthorized access to those computers. To launch this attack, a hacker must find an IP address of a trusted host and then modify the packet headers to disguise the traffic coming from that host. In this lab we used the tool Hping in the attack host to send message to CentOS using XP s IP address. During the entire course of the experiment, the packet sniffer, Wireshark, was used to monitor the spoofing activities between the attack and the victims.
4 Exploitation lab An exploit involves using software, data, or commands to take advantage of a bug (or vulnerability) of a computer system and the result causes the computer system to work in a manner of unexpected performance. The exploitation result, for example, could allow a hacker to gain control of a computer system, conduct privilege escalation, access a database, and become as a superuser of a system. In this lab, the tool Metasploit Framework was used to exploit a vulnerability of Mozilla Firefox that was installed in the victim XP machine. After migrating the exploited process to the victim, the victim s system information and the data can be monitored by the attacker Collecting victims' data lab Collecting victim s data happens once the attacker has obtained unauthorized access to the victim s machine. Data could be collected to be used in further exploits if the attacker chooses to do so. Having gained access to a victim s machine in the previous lab, we used keystroke logging (keylogging) to record victim s keys keystroke data on the keyboard. By using this approach, everything the victim typed, such as username and password in an account and a social network site, were captured by the attacker Self-study penetration testing labs In addition to the above labs, students are asked to create and perform a penetration testing experiment by themselves for the purpose of enhancing the knowledge of the subject. Some examples from this endeavor include: WPA-PSK key cracking by using aircrack-ng, bypassing a password protected Windows system, fingerprinting the operating system, searching for vulnerabilities on a remote system, and crashing an application on a victim's machine. 3. Project Evaluation The project was offered online for distance education graduate students in an intrusion detection and incidents response course. An online survey with ten questions (Table 1) was designed to assess students experiences at the end of 2013 fall semester. The objective of the survey was to evaluate the project s effectiveness in order to improve the lab manuals for future use. In the design of the questions, a five-level Likert scale was used. Available responses were: strongly disagree, disagree, neutral, agree, and strongly agree. In order to investigate attitudes of the respondents toward each question, we coded the responses accordingly: strongly disagree = 1, disagree = 2, neutral = 3, agree = 4, and strongly agree = 5. Table 2 shows the descriptive statistics result. Totally 12 questionnaires were successfully collected at the end of the course.
5 5 Table 1. Survey Questions No. Question 1 The steps of labs shown in the assignment are clear and easy to follow. 2 The assignment provides all of the necessary information in order to conduct lab activities. 3 The learning objectives of labs are clearly described. 4 I would rate the overall quality of the project as high. 5 I would rate the technical difficulty of the labs as difficult. 6 BackTrack is a good tool for learning penetration testing. 7 I have a better understanding of penetration testing after finishing the labs. It s a good strategy to simulate network attacks in a virtualization environment, instead of 8 using physical network devices. 9 I believe I am able to apply the knowledge of penetration testing to my future career. 10 I spent excessive time working on this project. Question Strongly Disagree (1) Disagree (2) Table 2. Survey Statistics Result Neutral (3) Agree (4) Strongly Agree (5) Mean Standard Deviation 1 4 (33.33%) 8 (66.67%) (8.33%) 4 (33.33%) 7 (58.33%) (8.33%) 3 (25.00%) 8 (66.67%) (8.33%) 4 (33.33%) 7 (58.33%) (8.33%) 7 (58.33%) 2 (16.67%) 2 (16.67%) (100.00%) (8.33%) 3 (25.00%) 8 (66.67%) (8.33%) 11 (91.67%) (8.33%) 3 (25.00%) 8 (66.67%) (16.67%) 3 (25.00%) 2 (16.67%) 5 (41.67%) Overall the average of the ten questions was approximately 4, which shows the students had generally positive attitudes toward the course. Over 90% of students selected strongly agree and agree on the survey questions except questions 5 and 10. All of the students agreed that BackTrack is a good tool for learning penetration testing. Students affirmed that the lab instructions were clear and very well written. After finishing the labs, students had a better understanding of penetration testing concepts. They agreed that the project provided valuable information on penetration testing and plan to apply what they have learnt in their future careers. In addition to the 10 questions, students were also asked to provide one example where they have added to their knowledge from this project. Some of responses were: I haven t had the chance to use BT5 and I really enjoyed learning the footprinting tools and I think that they will be very
6 6 useful to me throughout my personal life and career., I gained a great deal of knowledge on the concepts behind attack strategies., I feel like this assignment provides good details and requires the student to really get to know BackTrack and its abilities., I have had some experience with the tools inside of BackTrack, this experiment increased my knowledge of the tools capabilities which has been a great experience for my understanding of the potential attacks that could occur., and I ve been through many network security classes, but this series of assignments really helped me understand the actual processes that take place when and IDS is put into place and working. 4. Conclusions and Future Work In this project created a virtualized network environment that included three different virtual machines using VMware. The environment provided students with a confined place to carry out penetration testing activities. Students studied information systems vulnerabilities exploitation and conducted security assessments using a variety of network security tools. This project helped the students to gain a better understanding of the characteristics and nature of information systems vulnerabilities. It also helped students become better prepared for career opportunities in the field of network security. We plan to continue revising and upgrading the lab activities based on the feedback received from students. In addition, this project could be used as a foundation for developing more penetration testing labs to help broaden students aspect of security awareness and assessment. Acknowledgement The authors would like to thank the summer funding support from College of Technology and Computer Science at East Carolina University. References [1] Chou, Te-Shun, Understanding Computer Network Vulnerabilities and Security Threats via Packet Signature Analysis, American Society for Engineering Education (ASEE) The Computers in Education Journal, Volume XXIII, Number 3, (2013). [2] Chou, Te-Shun, Development of an Intrusion Detection and Prevention System Project Using Virtualization Technology, International Journal of Education and Development using Information and Communication Technology, Volume 7, Issue 2, 46-55, (2011). [3] Vmware: (Last browsed in March 2014) [4] Linux CentOS: (Last browsed in March 2014) [5] Windows XP: (Last browsed in March 2014) [6] BackTrack: (Last browsed in March 2014)
Development of an Intrusion Detection and Prevention Course Project Using Virtualization Technology. Te-Shun Chou East Carolina University, USA
International Journal of Education and Development using Information and Communication Technology (IJEDICT), 20, Vol. 7, Issue 2, pp. 46-55. Development of an Intrusion Detection and Prevention Course
More informationAC 2012-3856: TEACHING NETWORK SECURITY THROUGH SIGNA- TURE ANALYSIS OF COMPUTER NETWORK ATTACKS
AC 2012-3856: TEACHING NETWORK SECURITY THROUGH SIGNA- TURE ANALYSIS OF COMPUTER NETWORK ATTACKS Dr. Te-Shun Chou, East Carolina University Te-Shun Chou received his bachelor s degree in electronics engineering
More informationDuring your session you will have access to the following lab configuration. CLIENT1 (Windows XP Workstation) 192.168.0.2 /24
Introduction The Network Vulnerabilities module provides you with the instruction and Server hardware to develop your hands on skills in the defined topics. This module includes the following exercises:
More informationEnumerating and Breaking VoIP
Enumerating and Breaking VoIP Introduction Voice over Internet Protocol (VoIP) has seen rapid implementation over the past few years. Most of the organizations which have implemented VoIP are either unaware
More informationOwn your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
More informationOverview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
More informationBuild Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
More informationDetailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
More informationhttps://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting
https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests
More informationProfessional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
More informationLinux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
More informationNetwork/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
More informationIDS and Penetration Testing Lab ISA 674
IDS and Penetration Testing Lab ISA 674 Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible Use
More informationCYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE
CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)
More informationIDS and Penetration Testing Lab ISA656 (Attacker)
IDS and Penetration Testing Lab ISA656 (Attacker) Ethics Statement Network Security Student Certification and Agreement I,, hereby certify that I read the following: University Policy Number 1301: Responsible
More informationDistributed Systems Security
Distributed Systems Security Tutorial Dennis Pfisterer Institute of Telematics, University of Lübeck http://www.itm.uni-luebeck.de/users/pfisterer Non Sequitur by Wiley Security - 08 Firewalls Assessing
More informationPacket Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA
A Seminar report On Packet Sniffers Submitted in partial fulfillment of the requirement for the award of degree Of MCA SUBMITTED TO: www.studymafia.org SUBMITTED BY: www.studymafia.org Preface I have made
More informationFortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
More information2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
More informationPacket Sniffer Detection with AntiSniff
Ryan Spangler University of Wisconsin - Whitewater Department of Computer and Network Administration May 2003 Abstract Packet sniffing is a technique of monitoring every packet that crosses the network.
More informationCourse Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
More informationCYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
More informationThreat Events: Software Attacks (cont.)
ROOTKIT stealthy software with root/administrator privileges aims to modify the operation of the OS in order to facilitate a nonstandard or unauthorized functions unlike virus, rootkit s goal is not to
More informationLab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
More informationVirtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
More information1. LAB SNIFFING LAB ID: 10
H E R A LAB ID: 10 SNIFFING Sniffing in a switched network ARP Poisoning Analyzing a network traffic Extracting files from a network trace Stealing credentials Mapping/exploring network resources 1. LAB
More informationPacket Sniffing on Layer 2 Switched Local Area Networks
Packet Sniffing on Layer 2 Switched Local Area Networks Ryan Spangler ryan@packetwatch.net Packetwatch Research http://www.packetwatch.net December 2003 Abstract Packet sniffing is a technique of monitoring
More informationWIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006
WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able
More informationModern snoop lab lite version
Modern snoop lab lite version Lab assignment in Computer Networking OpenIPLab Department of Information Technology, Uppsala University Overview This is a lab constructed as part of the OpenIPLab project.
More informationCain & Abel v 2.5. Password Cracking Via ARP Cache Poisoning Attacks. v.1. Page 1 of 15
Cain & Abel v 2.5 Password Cracking Via ARP Cache Poisoning Attacks v.1 2004 Page 1 of 15 Objective: At the end of this lab students will be able to use the password auditing and ARP Poison Routing (APR)
More informationSession Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor shray.kapoor@gmail.com Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
More informationCRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
More informationCOURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
More informationEthical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
More informationBASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
More informationCMPT 471 Networking II
CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access
More informationHONEYD (OPEN SOURCE HONEYPOT SOFTWARE)
HONEYD (OPEN SOURCE HONEYPOT SOFTWARE) Author: Avinash Singh Avinash Singh is a Technical Evangelist currently worksing at Appin Technology Lab, Noida. Educational Qualification: B.Tech from Punjab Technical
More informationDMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch
DMZ Virtualization Using VMware vsphere 4 and the Cisco Nexus 1000V Virtual Switch What You Will Learn A demilitarized zone (DMZ) is a separate network located in the neutral zone between a private (inside)
More informationCourse Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
More informationWLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.
Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised
More informationCertified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
More informationLesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division
Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation
More informationARP Poisoning (Man-in-the-Middle) Attack and Mitigation Techniques
Layer 2 Attacks and Mitigation Techniques for the Cisco Catalyst 6500 Series Switches Running Cisco IOS Software ARP Poisoning (Man-in-the-Middle) Attack and Mitigation Techniques A CSSTG SE Residency
More informationFootprinting and Reconnaissance Tools
Footprinting and Reconnaissance Tools Topic 1: Common Port Scanning Techniques Do some research on computer ports that are most often scanned by hackers. Identify a port scanning exploit that is interesting
More informationStorage Cloud Infrastructures
Storage Cloud Infrastructures Detection and Mitigation of MITM Attacks Presenter: Jaqueline Carmilema CyberSecurity for the Next Generation South American Round, Quito 31 January 1 February, 2013 PAGE
More informationCS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
More informationSecurity Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis?
Security Threat Kill Chain What log data would you need to identify an APT and perform forensic analysis? This paper presents a scenario in which an attacker attempts to hack into the internal network
More informationPotential Targets - Field Devices
Potential Targets - Field Devices Motorola Field Devices: Remote Terminal Units ACE 3600 Front End Devices ACE IP Gateway ACE Field Interface Unit (ACE FIU) 2 Credential Cracking Repeated attempts to
More informationCYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
More informationARP and DNS. ARP entries are cached by network devices to save time, these cached entries make up a table
ARP and DNS Both protocols do conversions of a sort, but the distinct difference is ARP is needed for packet transfers and DNS is not needed but makes things much easier. ARP Address Resolution Protocol
More informationLearn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
More informationIntrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
More informationCourse Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
More informationMONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
More informationITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
More informationSecurity of IPv6 and DNSSEC for penetration testers
Security of IPv6 and DNSSEC for penetration testers Vesselin Hadjitodorov Master education System and Network Engineering June 30, 2011 Agenda Introduction DNSSEC security IPv6 security Conclusion Questions
More informationExam 1 - CSIS 3755 Information Assurance
Name: Exam 1 - CSIS 3755 Information Assurance True/False Indicate whether the statement is true or false. 1. Antiquated or outdated infrastructure can lead to reliable and trustworthy systems. 2. Information
More informationIDS and Penetration Testing Lab II
IDS and Penetration Testing Lab II Software Requirements: 1. A secure shell (SSH) client. For windows you can download a free version from here: http://the.earth.li/~sgtatham/putty/latest/x86/putty-0.62-
More informationCTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
More informationGeneral Network Security
4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those
More informationComputer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce. Domain Name System
Computer Networks: DNS a2acks CS 1951e - Computer Systems Security: Principles and Prac>ce 18/02/15 Networks: DNS attacks 1 Domain Name System The domain name system (DNS) is an applica>on- layer protocol
More informationNational Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
More informationMore Practical Projects
More Theoretical Projects T1) Privacy-Preserving Data Dissemination Goal: Contribute to design and develoment of a scheme for privacy-preserving data dissemination. (Research papers are available from
More informationKali Linux Cookbook. Willie L. Pritchett David De Smet. Chapter No. 9 "Wireless Attacks"
Kali Linux Cookbook Willie L. Pritchett David De Smet Chapter No. 9 "Wireless Attacks" In this package, you will find: A Biography of the authors of the book A preview chapter from the book, Chapter NO.9
More informationSY0-201. system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users.
system so that an unauthorized individual can take over an authorized session, or to disrupt service to authorized users. From a high-level standpoint, attacks on computer systems and networks can be grouped
More informationNetwork Security. Dr. Ihsan Ullah. Department of Computer Science & IT University of Balochistan, Quetta Pakistan. April 23, 2015
Network Security Dr. Ihsan Ullah Department of Computer Science & IT University of Balochistan, Quetta Pakistan April 23, 2015 1 / 24 Secure networks Before the advent of modern telecommunication network,
More informationWhen a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
More informationco Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
More informationINTRODUCTION: PENETRATION TEST A BUSINESS PERSPECTIVE:
PENETRATION TESTING A SYSTEMATIC APPROACH INTRODUCTION: The basic idea behind writing this article was to put forward a systematic approach that needs to be followed to perform a successful penetration
More informationRon Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems
Ron Shuck, CISSP, CISM, CISA, GCIA Infrastructure Security Architect Spirit AeroSystems VOIP Components Common Threats How Threats are Used Future Trends Provides basic network connectivity and transport
More informationThis session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit.
The hidden risks of mobile applications This session was presented by Jim Stickley of TraceSecurity on Wednesday, October 23 rd at the Cyber Security Summit. To learn more about TraceSecurity visit www.tracesecurity.com
More informationWEB SECURITY. Oriana Kondakciu 0054118 Software Engineering 4C03 Project
WEB SECURITY Oriana Kondakciu 0054118 Software Engineering 4C03 Project The Internet is a collection of networks, in which the web servers construct autonomous systems. The data routing infrastructure
More informationPenetration Testing LAB Setup Guide
Penetration Testing LAB Setup Guide (External Attacker - Intermediate) By: magikh0e - magikh0e@ihtb.org Last Edit: July 06 2012 This guide assumes a few things... 1. You have read the basic guide of this
More information040020305-Penetration Testing 2014
Comprehensive Questions/Practical Based :- 040020305-Penetration Testing 2014 1. Demonstrate the installation of BackTrack using Live DVD. Also list all the steps. 2. Demonstrate the installation of BackTrack
More informationThe Trivial Cisco IP Phones Compromise
Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group ofir@sys-security.com http://www.sys-security.com September 2002
More informationFIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
More informationIf you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group ruiper@wavefrontcg.com 1 (604) 961-0701 If you know the enemy and know yourself, you
More informationNetwork Attacks. Blossom Hands-on exercises for computer forensics and security
Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative
More informationContents. vii. Preface. P ART I THE HONEYNET 1 Chapter 1 The Beginning 3. Chapter 2 Honeypots 17. xix
Honeynet2_bookTOC.fm Page vii Monday, May 3, 2004 12:00 PM Contents Preface Foreword xix xxvii P ART I THE HONEYNET 1 Chapter 1 The Beginning 3 The Honeynet Project 3 The Information Security Environment
More informationINDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION
INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION Prepared for the NRC Fuel Cycle Cyber Security Threat Conference Presented by: Jon Chugg, Ken Rohde Organization(s): INL Date: May 30, 2013 Disclaimer
More informationEC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
More information20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
More informationWireless Security: Secure and Public Networks Kory Kirk
Wireless Security: Secure and Public Networks Kory Kirk Villanova University Computer Science kory.kirk@villanova.edu www.korykirk.com/ Abstract Due to the increasing amount of wireless access points that
More informationNetwork Forensics: Log Analysis
Network Forensics: Analysis Richard Baskerville Agenda P Terms & -based Tracing P Application Layer Analysis P Lower Layer Analysis Georgia State University 1 2 Two Important Terms PPromiscuous Mode
More informationMake a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
More informationKerem Kocaer 2010/04/14
Kerem Kocaer 1 EHLO Kerem is: a graduate from ICSS a security consultant at Bitsec Consulting AB a security enthusiast Kerem works with: administrative security security standards and frameworks, security
More informationRMAR Technologies Pvt. Ltd.
Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical
More informationVulnerability Assessment and Penetration Testing
Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration
More informationPROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
More informationGuideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
More informationCyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014
Cyber Security In High-Performance Computing Environment Prakashan Korambath Institute for Digital Research and Education, UCLA July 17, 2014 Introduction: Cyber attack is an unauthorized access to a computer
More informationWi-Fi and security Wireless Networking and Security by Alain RASSEL
Wi-Fi and security Wireless Networking and Security by Alain RASSEL 1 23.11.04 Overview: Simple configuration example Obvious simple protection means Change Administrator Password Restrict administrator
More informationThreat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437. Specialist Security Training Catalogue
Threat Intelligence Pty Ltd info@threatintelligence.com 1300 809 437 Specialist Security Training Catalogue Did you know that the faster you detect a security breach, the lesser the impact to the organisation?
More informationBuilding Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
More informationEthical Hacking as a Professional Penetration Testing Technique
Ethical Hacking as a Professional Penetration Testing Technique Rochester ISSA Chapter Rochester OWASP Chapter - Durkee Consulting, Inc. info@rd1.net 2 Background Founder of Durkee Consulting since 1996
More informationCS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013
CS 356 Lecture 17 and 18 Intrusion Detection Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
More informationAttack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
More informationOutline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
More informationExploring Layer 2 Network Security in Virtualized Environments. Ronny L. Bull & Jeanna N. Matthews
Exploring Layer 2 Network Security in Virtualized Environments Ronny L. Bull & Jeanna N. Matthews Road Map Context for the Problem of Layer 2 Network Security in Virrtualized Environments Virtualization,
More informationLab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
More information